Geert Moernaut LSrunasE and Supercrypt use an encryption key composed of an SHA1 hash of a fixed string embedded in the executable file, which makes it easier for local users to obtain this key without reverse engineering.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/487269/100/0/threaded | mailing list |
http://www.securityfocus.com/bid/27500 | vdb entry |
http://securityreason.com/securityalert/3611 | third party advisory |